Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 06.01.2026 15:06:55

In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on...

  • EPSS 0.02%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 03.11.2025 22:17:04

In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Th...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 03.11.2025 22:17:05

In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_d...

  • EPSS 0%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 03.11.2025 22:17:05

In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put sk_psock_get will return NULL if the refcount of psock has gone to 0, which will happen when the last call of sk_psock_...

  • EPSS 0.2%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 10.05.2025 15:15:58

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 03.11.2025 22:17:06

In the Linux kernel, the following vulnerability has been resolved: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet In lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value, but then it is unconditionally passed...

  • EPSS 0.03%
  • Veröffentlicht 10.07.2024 08:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it's going to leak all that memory and the cr...

  • EPSS 0.12%
  • Veröffentlicht 10.07.2024 08:15:11
  • Zuletzt bearbeitet 24.03.2025 17:23:25

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix missing sk_buff release in seg6_input_core The seg6_input() function is responsible for adding the SRH into a packet, delegating the operation to the seg6_input_core(...

  • EPSS 0.01%
  • Veröffentlicht 09.07.2024 10:15:04
  • Zuletzt bearbeitet 03.11.2025 22:17:04

In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() In function bond_option_arp_ip_targets_set(), if newval->string is an empty string, newval->string+1 will point ...

  • EPSS 0.02%
  • Veröffentlicht 05.07.2024 07:15:10
  • Zuletzt bearbeitet 21.11.2024 09:27:44

In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with small possibility, the root...